Framework for Behavioral Analysis of Mobile Networks
<p>Block diagram of the proposed framework.</p> "> Figure 2
<p>Block diagram of training phase in the proposed framework.</p> "> Figure 3
<p>Decision tree example.</p> "> Figure 4
<p>Block diagram of the operation phase in the proposed framework.</p> "> Figure 5
<p>(<b>a</b>) Map of neurons at SOM output. (<b>b</b>) Map of neurons at post-processing output.</p> "> Figure 6
<p>Volume data traffic in downlink.</p> "> Figure 7
<p>CQI.</p> ">
Abstract
:1. Introduction
- The proposed framework is designed to analyze the overall performance in a mobile network, since it allows the inclusion of indicators related to different aspects of the network (e.g., traffic, radio conditions, quality). In addition, it can be set up for the characterization of the network focusing on a specific aspect such as type of traffic or a certain management task.
- The use of an unsupervised pre-stage allows the system to automatically tag an untagged real dataset for use as input to a subsequent supervised stage. This aspect enables the benefits of unsupervised and supervised algorithms to be exploited in the same system.
- The framework consists of two phases: a first training stage intended to acquire knowledge as cell patterns from the data and a second part that monitors the network to detect possible pattern change, not necessarily related to a network failure. For this reason, the proposed framework is intended to be used not only for information extraction, but also for network monitoring.
- The system has been tested with a live LTE dataset since it is currently the predominant technology. However, the methodology followed for the framework definition and implementation can be adapted to any other mobile network technology, since the SOM algorithm is based on finding patterns in the set of network indicators used as inputs regardless of the network technology. This amount of data is expected to be larger in the new 5G networks; hence, the use of the propose framework will benefit operators in the management tasks.
2. State of the Art
3. Proposed Framework
3.1. Training Phase
3.1.1. Cell Patterns Detection Block
- Learning rate (). It indicates how much is learned from the input data in each iteration. It must be set to an initial value that will decrease with each iteration according to the decay function.
- Neighborhood rate (). It indicates which of the neurons on the map must be considered neighbors. It is interpreted as a maximum distance to the activated neuron in each iteration. Those neurons included in this distance are considered as neighbors and therefore update their weight vector. As the learning rate indicator, it must also be set to an initial value that will decrease with each iteration.
- Maximum of iterations. Indicates the maximum number of iterations that the algorithm performs if it does not reach convergence.
- Size of map. It is adjusted according to Expression (2),
- Decay function. Function used to reduce learning and neighborhood rates in each iteration of the algorithm. The default function is shown in Expression (3),
- The Euclidean distances between each neuron and the input data are calculated. Weight vectors of each neuron are used together with the input weight vector following Expression (4),
- The “winning neuron” must update its weight vector according to the learning rate and the input data vector.
- Neurons considered as neighbors also update their weight vector. The neighborhood rate determines if a neuron is considered as a neighbor or not as indicated by Expression (5),
- Before starting a new iteration, new values are calculated for the learning and neighborhood rates according to (6) and (7), respectively,
3.1.2. Cell Pattern Classification Block
- Number of decision trees. It establishes the number of trees that constitutes the forest. It must be chosen in relation to the input dataset to avoid overhead.
- Division criterion. It defines how good a division is according to the condition set in the node. The two most commonly used criteria are: Gini and Entropy criteria. The Gini criterion measures the probability of failure if the classification is made in the current node, while Entropy measures the information gain that each division provides.
- Bootstrap. This parameter decides how each tree is built independently. If it is activated, the initial dataset is divided into different subsets, one for each tree. In this case, a maximum size for these subsets is established. Otherwise, the complete dataset is used for each tree.
- Maximum leaves per tree. It sets the limit of leaves on a tree in the forest.
- Minimum samples to split. It indicates the minimum of samples needed to consider a new split.
- Maximum samples to split. It indicates the maximum number of samples to consider in order to choose the condition that determines the split.
3.2. Operation Phase
4. Experiments and Results
4.1. Experiments Setup
4.2. Cell Pattern Detection
- Pattern 0 (Green). This is one of the groups with more cells, and it could be considered as a good-behavior pattern for the analyzed network. It has a quite high number of connected users, and consequently a high number of transmitted data. Throughput per user and per cell achieves high values. It does not reach high levels of resource use, neither of data nor of signaling, and the blocking rate is quite low. It seems to represent not very large cells, which leads to lower latency. In addition, the connections quality is quite high.
- Pattern 1 (Red). This pattern represents a group of cells with a larger coverage area, although the number of connected users is not very high. The quality offered looks to be quite bad possibly due to high distance between users and base stations, which leads to a higher use of both signaling and data resources. However, the blocking rate is not too high. Poor quality also affects traffic levels and transmission rates on both the downlink and the uplink, despite the higher utilization of resources available in the cells.
- Pattern 2 (Blue). This pattern is the opposite of Pattern 0, and it characterizes those cells that may be performing worst in the network. These cells are of an intermediate size, but the number of connected users is very low. In addition, the high level of retries per connection indicates that users have trouble accessing the network. It also corresponds to the cells that offer the worst quality, and therefore the transmission levels achieved are quite low, as are the numbers of data transmitted on both links. The poor quality provided also appears in the use of resources, which presents values that are too high compared to the number of users in the cells. In addition, the blocking rate is quite high in this pattern despite not having a high number of users. In this case, there is not a clear reason to justify the behavior of this group, although it can be concluded that the performance of these cells is poor, and a configuration problem or external cause may be the reasons for this malfunction.
- Pattern 3 (Orange). This is an intermediate cell pattern because it reaches quite high-quality levels compared to those available for the cells corresponding to Pattern 0. The main difference is the number of users connected to the cells, which is slightly lower. This implies a lower use of both data and signaling resources. The size of the cells is also similar, even improving in terms of latency, as the transmission rates achieved per user are also better. It can be concluded that the cells belonging to this group have a good overall performance.
- Pattern 4 (Brown). This pattern is also in the middle, given that it is very similar to Pattern 0 in levels of connected users. In contrast, the quality offered by its cells is not as high as in Pattern 0; therefore, traffic levels and transmission rates on both links are affected. This quality, together with the larger size of the cells, leads to a higher use of available resources for both signaling and user data. In this case, as for Pattern 1, the high distance of connected users may be causing the decrease in quality in relation to other groups. In many cases, this high value of user distance is determined by a bad adjustment of some configuration parameters.
- Pattern 5 (Yellow). Finally, a pattern is identified whose quality is adequate, but the number of users connected is too low, with levels comparable to Pattern 2 being reached. In this way, the use of signaling and data resources is very low. Moreover, the volume of transmitted data is also very low in both directions. However, the transmission rates experienced by users are even better than in Pattern 0, as the quality is quite good, and the number of connected users is very low. These factors that cause the latency in the coverage area to be minimal, even if the coverage area is not particularly small.
4.3. Cell Patterns Classification
4.4. Operation Phase
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Chandramouli, D.; Liebhart, R.; Pirskanen, J. 5G for the Connected World; Wiley: New York, NY, USA, 2019. [Google Scholar]
- 3GPP. TS 23.501, System Architecture for the 5G System (5GS); Rel-16, V16.7.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144 (accessed on 25 January 2021).
- 3GPP. TS 38.300, NR; NR and NG-RAN Overall Description; Stage-2; Rel-16, V16.4.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3191 (accessed on 12 February 2021).
- 3GPP. TS 38.913, Study on Scenarios and Requirements for Next Generation Access Technologies; Rel-15, V15.0.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2996 (accessed on 12 February 2021).
- Ramiro, J.; Hamied, K. Self-Organizing Networks: Self-Planning, Self-Optimization and Self-Healing for GSM, UMTS and LTE; ITPro Collection; Wiley: New York, NY, USA, 2011. [Google Scholar]
- Mohri, M.; Rostamizadeh, A.; Talwalkar, A. Foundations of Machine Learning; Adaptive Computation and Machine Learning Series; MIT Press: Cambridge, MA, USA, 2012. [Google Scholar]
- Hübner, D.; Tangermann, M. From Supervised to Unsupervised Machine Learning Methods for Brain-Computer Interfaces and Their Application in Language Rehabilitation; Albert-Ludwigs-Universität: Freiburg, Germany, 2020. [Google Scholar]
- Kohonen, T.; Huang, T.; Schroeder, M. Self-Organizing Maps; Physics and Astronomy Online Library; Springer: Berlin/Heidelberg, Germany, 2001. [Google Scholar]
- Breiman, L. Random Forests. Mach. Learn. 2001, 45, 5–32. [Google Scholar] [CrossRef] [Green Version]
- 3GPP. TS 32.500, Telecommunication Management; Self-Organizing Networks (SON); Concepts and Requirements; Rel-16, V16.0.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2031 (accessed on 12 February 2021).
- 3GPP. TS 28.313, Management and Orchestration: Self-Organizing Networks (SON) for 5G Networks; Rel-16, V0.2.0. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3695 (accessed on 12 February 2021).
- Usman, M.A.; Philip, N.Y.; Politis, C. 5G Enabled Mobile Healthcare for Ambulances. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Sharma, S.K.; Wang, X. Toward Massive Machine Type Communications in Ultra-Dense Cellular IoT Networks: Current Issues and Machine Learning-Assisted Solutions. IEEE Commun. Surv. Tutor. 2020, 22, 426–471. [Google Scholar] [CrossRef] [Green Version]
- Imran, A.; Zoha, A.; Abu-Dayya, A. Challenges in 5G: How to empower SON with big data for enabling 5G. IEEE Netw. 2014, 28, 27–33. [Google Scholar] [CrossRef]
- Mulvey, D.; Foh, C.H.; Imran, M.A.; Tafazolli, R. Cell Fault Management Using Machine Learning Techniques. IEEE Access 2019, 7, 124514–124539. [Google Scholar] [CrossRef]
- Kiran, P.; Jibukumar, M.G.; Premkumar, C.V. Resource allocation optimization in LTE-A/5G networks using big data analytics. In Proceedings of the 2016 International Conference on Information Networking (ICOIN), Kota Kinabalu, Malaysia, 13–15 Janauary 2016; pp. 254–259. [Google Scholar]
- Zheng, K.; Yang, Z.; Zhang, K.; Chatzimisios, P.; Yang, K.; Xiang, W. Big data-driven optimization for mobile networks toward 5G. IEEE Netw. 2016, 30, 44–51. [Google Scholar] [CrossRef]
- Sinclair, N.; Harle, D.; Glover, I.A.; Irvine, J.; Atkinson, R.C. An Advanced SOM Algorithm Applied to Handover Management Within LTE. IEEE Trans. Veh. Technol. 2013, 62, 1883–1894. [Google Scholar] [CrossRef] [Green Version]
- Sukkhawatchani, P.; Usaha, W. Performance evaluation of anomaly detection in cellular core networks using self-organizing map. In Proceedings of the 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, Krabi, Thailand, 14–17 May 2008; Volume 1, pp. 361–364. [Google Scholar] [CrossRef]
- Frota, R.; Barreto, G.; Mota, j. Anomaly detection in mobile communication network using the self-organizing map. J. Intell. Fuzzy Syst. 2007, 18, 493–500. [Google Scholar]
- Gajic, B.; Nováczki, S.; Mwanje, S. An improved anomaly detection in mobile networks by using incremental time-aware clustering. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada, 11–15 May 2015; pp. 1286–1291. [Google Scholar] [CrossRef]
- Hussain, B.; Du, Q.; Ren, P. Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks. China Commun. 2018, 15, 41–57. [Google Scholar] [CrossRef]
- de-la-Bandera, I.; Barco, R.; Muñoz, P.; Serrano, I. Cell Outage Detection Based on Handover Statistics. IEEE Commun. Lett. 2015, 19, 1189–1192. [Google Scholar] [CrossRef]
- Muñoz, P.; Barco, R.; Cruz, E.; Gomez Andrades, A.; Khatib, E.J.; Faour, N. A method for identifying faulty cells using a classification tree-based UE diagnosis in LTE. EURASIP J. Wirel. Commun. Netw. 2017, 2017. [Google Scholar] [CrossRef]
- Gomez-Andrades, A.; Muñoz, P.; Serrano, I.; Barco, R. Automatic Root Cause Analysis for LTE Networks Based on Unsupervised Techniques. IEEE Trans. Veh. Technol. 2015, 65, 2369–2386. [Google Scholar] [CrossRef]
- Gómez-Andrades, A.; Barco, R.; Muñoz, P.; Serrano, I. Data Analytics for Diagnosing the RF Condition in Self-Organizing Networks. IEEE Trans. Mob. Comput. 2017, 16, 1587–1600. [Google Scholar] [CrossRef]
- Riihijarvi, J.; Mahonen, P. Machine Learning for Performance Prediction in Mobile Cellular Networks. IEEE Comput. Intell. Mag. 2018, 13, 51–60. [Google Scholar] [CrossRef]
- Falkenberg, R.; Sliwa, B.; Piatkowski, N.; Wietfeld, C. Machine Learning Based Uplink Transmission Power Prediction for LTE and Upcoming 5G Networks Using Passive Downlink Indicators. In Proceedings of the 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 27–30 August 2018; pp. 1–7. [Google Scholar]
- Dohnalek, P.; Dvorsky, M.; Gajdos, P.; Michalek, L.; Sebesta, R.; Voznak, M. A Signal Strength Fluctuation Prediction Model Based on the Random Forest Algorithm. Elektron. Elektrotechnika 2014, 20, 123–126. [Google Scholar] [CrossRef]
- Hahn, S.; Gotz, D.; Lohmuller, S.; Schmelz, L.C.; Eisenblatter, A.; Kurner, T. Classification of Cells Based on Mobile Network Context Information for the Management of SON Systems. In Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), Glasgow, UK, 11–14 May 2015; pp. 1–5. [Google Scholar]
- Laiho, J.; Raivio, K.; Lehtimaki, P.; Hatonen, K.; Simula, O. Advanced analysis methods for 3G cellular networks. IEEE Trans. Wirel. Commun. 2005, 4, 930–942. [Google Scholar] [CrossRef] [Green Version]
- Raivio, K.; Simula, O.; Laiho, J.; Lehtimaki, P. Analysis of mobile radio access network using the self-organizing map. In Proceedings of the IFIP/IEEE Eighth International Symposium on Integrated Network Management, Colorado Springs, CO, USA, 24–28 March 2003; pp. 439–451. [Google Scholar]
- Kumpulainen, P.; Hätönen, K. Characterizing Mobile Network Daily Traffic Patterns by 1-Dimensional SOM and Clustering. In Engineering Applications of Neural Networks; Jayne, C., Yue, S., Iliadis, L., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 325–333. [Google Scholar]
- Clemente, D.; Soares, G.; Fernandes, D.; Cortesao, R.; Sebastiao, P.; Ferreira, L.S. Traffic Forecast in Mobile Networks: Classification System Using Machine Learning. In Proceedings of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA, 22–25 September 2019; pp. 1–5. [Google Scholar]
- Conti, M.; Mancini, L.V.; Spolaor, R.; Verde, N.V. Analyzing Android Encrypted Network Traffic to Identify User Actions. IEEE Trans. Inf. Forensics Secur. 2016, 11, 114–125. [Google Scholar] [CrossRef]
- Wang, C.; Xu, T.; Qin, X. Network Traffic Classification with Improved Random Forest. In Proceedings of the 2015 11th International Conference on Computational Intelligence and Security (CIS), Shenzhen, China, 19–20 December 2015; pp. 78–81. [Google Scholar]
- Fernandez-Delgado, M.; Cernadas, E.; Barro, S.; Amorim, D. Do we Need Hundreds of Classifiers to Solve Real World Classification Problems? J. Mach. Learn. Res. 2014, 15, 3133–3181. [Google Scholar]
- Browne, M.W. Cross-Validation Methods. J. Math. Psychol. 2000, 44, 108–132. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Algorithms | Context/Objective | Work |
---|---|---|
Binary non-orthogonal Singular Value Decomposition (SVD) | Resource allocation optimization | [16] |
XSOM (A modified SOM) | Handover management optimization | [18] |
SOM | Anomaly detection | [19,20] |
MGNG algorithm | Anomaly detection | [21] |
Semi-supervised statistical-based algorithm | Sleeping cell detection | [22] |
Rule-based system | Cell outage detection | [23] |
Classification Tree | Diagnosis | [24] |
Unsupervised techniques (SOM as the center-piece) | Diagnosis | [25] |
SOM | Radio Frequencies (RF) conditions diagnosis | [26] |
Random Forest, Deep Learning, Ridge Regression (Separated tests) | Transmission power prediction | [28] |
Random Forest | Signal strength prediction | [29] |
SOM | Cell pattern detection based on context information | [30] |
SOM, K-Means | Cell pattern detection in 3G networks | [31] |
SOM, K-Means | Radio access network analysis through behavioral patterns detection | [32] |
SOM | Detection of daily traffic patterns | [33] |
Naive Bayes, Holt-Winters | Classification of cells in terms of traffic | [34] |
Unsupervised (Hierarchical clustering) and supervised (Random Forest) algorithms | Classification of traffic patterns by apps (Facebook, Twitter, Gmail, etc) | [35] |
Improved Random Forest | Traffic pattern classification | [36] |
Category | Key Performance Indicator |
---|---|
Traffic and Throughput | Cell throughput in downlink |
User throughput in downlink | |
Volume data traffic in downlink | |
Cell throughput in uplink | |
User throughput in uplink | |
Volume data traffic in uplink | |
Quality | QPSK usage rate in downlink |
QPSK usage rate in uplink | |
Spectral efficiency downlink | |
CQI | |
Users | Average of connected users |
Maximum of connected users | |
Restablishments success rate | |
Restablishments per connected user | |
Use of Resources | PRB usage rate in downlink |
PRB usage rate in uplink | |
Blocking rate in signaling resources | |
Signaling resources usage rate | |
Others | Latency in downlink |
RSSI in uplink control channel | |
RSSI in uplink shared channel | |
UE distance | |
SINR lower than 2 dB rate |
Parameter | Value |
---|---|
Size of map | 10 × 10 |
Learning rate | 0.9 |
neighbourhood rate | 9 |
Iterations | 100,000 |
Training method | Batch |
Threshold | Coefficients |
---|---|
High | |
Medium | |
Low |
Threshold | Coefficients | Number of Patterns |
---|---|---|
High | 4 | |
Medium | 6 | |
Low | 13 |
Key Performance Indicator | P0 | P1 | P2 | P3 | P4 | P5 |
---|---|---|---|---|---|---|
Number of cells | 132 | 20 | 120 | 36 | 57 | 85 |
Cell throughput in downlink | ||||||
User throughput in downlink | ||||||
Volume data traffic in downlink | ||||||
Cell throughput in uplink | ||||||
User throughput in uplink | ||||||
Volume data traffic in uplink | ||||||
QPSK usage rate in downlink | ||||||
QPSK usage rate in uplink | ||||||
Spectral efficiency downlink | ||||||
CQI | ||||||
Average of connected users | ||||||
Maximum of connected users | ||||||
Restablishments success rate | ||||||
Restablishments per connected user | ||||||
PRB usage rate in downlink | ||||||
PRB usage rate in uplink | ||||||
Blocking rate in signalling resources | ||||||
Signalling resources usage rate | ||||||
Latency in downlink | ||||||
RSSI in uplink control channel | ||||||
RSSI in uplink shared channel | ||||||
UE distance | ||||||
SINR lower than 2 dB rate |
Cross-Validation | Accuracy |
---|---|
5 | 97% (±2%) |
10 | 97% (±2%) |
15 | 97% (±3%) |
20 | 97% (±3%) |
Pattern | Accuracy | Recall | F1-Score | Samples |
---|---|---|---|---|
P0 | 0.95 | 0.98 | 0.97 | 57 |
P1 | 1.00 | 0.89 | 0.94 | 9 |
P2 | 0.97 | 0.98 | 0.98 | 61 |
P3 | 1.00 | 0.79 | 0.88 | 19 |
P4 | 0.95 | 0.95 | 0.95 | 21 |
P5 | 0.92 | 0.97 | 0.97 | 36 |
Key Performance Indicator | Importance (%) |
---|---|
Cell throughput in downlink | 11.00% |
User throughput in downlink | 2.92% |
Volume data traffic in downlink | 11.73% |
Cell throughput in uplink | 7.35% |
User throughput in uplink | 2.11% |
Volume data traffic in uplink | 8.67% |
QPSK usage rate in downlink | 2.34% |
QPSK usage rate in uplink | 3.51% |
Spectral efficiency downlink | 2.27% |
CQI | 2.00% |
Average of connected users | 5.14% |
Maximum of connected users | 4.18% |
Restablishments success rate | 1.32% |
Restablishments per connected user | 0.91% |
PRB usage rate in downlink | 3.16% |
PRB usage rate in uplink | 3.41% |
Blocking rate in signalling resources | 10.92% |
Signalling resources usage rate | 5.81% |
Latency in downlink | 4.29% |
RSSI in uplink control channel | 1.80% |
RSSI in uplink shared channel | 2.24% |
UE distance | 1.22% |
SINR lower than 2 dB rate | 1.69% |
Category | Accumulated (%) | Average (%) |
---|---|---|
Traffic and Throughput | 43.79 | 7.29 |
Quality | 10.11 | 2.53 |
Users | 11.55 | 2.88 |
Use of resources | 23.3 | 5.82 |
Others | 11.24 | 2.37 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Trujillo, J.A.; de-la-Bandera, I.; Palacios, D.; Barco, R. Framework for Behavioral Analysis of Mobile Networks. Sensors 2021, 21, 3347. https://doi.org/10.3390/s21103347
Trujillo JA, de-la-Bandera I, Palacios D, Barco R. Framework for Behavioral Analysis of Mobile Networks. Sensors. 2021; 21(10):3347. https://doi.org/10.3390/s21103347
Chicago/Turabian StyleTrujillo, José Antonio, Isabel de-la-Bandera, David Palacios, and Raquel Barco. 2021. "Framework for Behavioral Analysis of Mobile Networks" Sensors 21, no. 10: 3347. https://doi.org/10.3390/s21103347
APA StyleTrujillo, J. A., de-la-Bandera, I., Palacios, D., & Barco, R. (2021). Framework for Behavioral Analysis of Mobile Networks. Sensors, 21(10), 3347. https://doi.org/10.3390/s21103347